We intend to either replace IndyMedia or provoke IndyMedia to evolve in such a direction as to protect its writers and members of the resistance from brownshirt harassment.

The Future of the White Rose Journal
By Stephen DeVoy

We intend to either replace IndyMedia or provoke IndyMedia to evolve in such a
direction as to protect its writers and members of the resistance from
brownshirt harassment.

This project currently employs simple blog technology. We will use this simple
blog technology for a period of one year. During that year, we will develop a
software package intended to compete with IndyMedia’s open publishing software.
Our new software will not be derived from IndyMedia’s software. It will be
developed from scratch. The reason for making this choice is security. Cyber
thugs have learned the ins-and-outs of IndyMedia’s software. Since IndyMedia’s
software is open source, we suspect that it has been modified, over time, to
include several backdoors that are exploited by those targeting dissidents. Our
software will contain no backdoors. It will be secure and it will address the
security needs of dissidents.
The new technology will allow publishing under complete anonymity. However,
it will also include a mechanism to prevent abuse, ever from anonymous parties.
Like IndyMedia’s software, it will be viewable using any common HTML based
browser. Unlike IndyMedia’s software, one will not be able to publish using a
browser. A Java based client will be made available for downloading to anyone
that wishes to publish on the medium. Each copy of the client will contain a
unique code distributed across a very large code space for which only a small
percentage of the codes will be determined to be valid. In order to download a
publishing client, one will need to provide proof of identity. A tally will be
kept on the number of downloads to a specific person and the location of the
downloads. A limit on the number of downloads over a chosen time interval will
be determined. Publisher codes (a form of licensing) will be randomly generated
and no association between identity and publisher code will be maintained. This
will ensure anonymity. However, any publishing tool found to be put to
unethical use will be disabled by the server. The unethical party will be
forced to download a new copy of the publisher. Since there will be a limit on
the number of downloads within a chosen time period, the individual will run out
of download privileges and will be unable to publish until the interval passes.
Ethical free speech will be completely open. There will be absolutely no
constraints on political content. The only rules will govern the ethics of
publishing. For example, one will not be permitted to publish in some else’s
name. One will not be permitted to use the tool for smear campaigns. One will
not be permitted to use the tool for cyber stalking.
All communications between the publishing tool and the server will be
encrypted. The size of the article, as an encrypted entity, will be randomly
inflated in size so as to disrupt attempts to correlate size of transmission
with viewable articles. A random time delay between publishing and display will
be employed to break temporal associations between the act of publishing and the
act of displaying the article. This should thwart government and brownshirt
attempts to detect authorship.
An encrypted messaging service will be employed allowed users to communicate
with one another anonymously and in code. This will thwart government attempts
to monitor communications between users.
Other tools will be provided over time. We will include a tools that
performs textual analysis. It will be used to track cyber stalkers. The tools
will employ a neural network and will train itself on the language use of
stalkers and brownshirts. Once a good profile of a stalker’s language use has
been learned, an additional layer of security will be employed to analyze
publications automatically and flag for inspection any article determined to
conform to the language use of known stalkers.

Comments

You cannot create software which guarantees "complete anonymity". Also, why even bother, when you are only going to publish what you think is acceptable. From what I have read at your websites and here at IMC, you will probably accuse everyone who disagrees with you of being a member of some conspiracy. It will be impossible to prevent abuse if you cannot be sure who is publishing. I guarantee that the KOBE will be able to compromise your program. They havent been stopped yet by you.

Also, you say that KOBE is afraid of being exposed? I thought you already had their names and addresses. Why would they care about being exposed? That is, unless you dont really know if your information is correct, which I suspect is the case. I seriously doubt that you will get many supporters as long as the IMC collective exists. You are too self absorbed to allow anyone else's ideas to interfere with your plans. Im not holding my breath.

"We will develop a software package intended to compete with IndyMedia’s open publishing software."

Great...competition. An integral part of a radical, anti-capitalist society.

"Since IndyMedia’s software is open source, we suspect that it has been modified, over time, to include several backdoors that are exploited by those targeting dissidents."

Actually...open source software usually contains far less backdoors, because they are weeded out by whatever programmer feels the need to every time that they are used to gain access.

"Ethical free speech will be completely open. ... One will not be permitted to use the tool for smear campaigns. One will not be permitted to use the tool for cyber stalking."

And just who will determind the definition of "ethical free speech"? Who's going to say what is a "smear" campaign and what isn't? I suspect DeVoy will. Great...sounds like the framework of an anarchist society to me :).

"The tools will employ a neural network and will train itself on the language use of stalkers and brownshirts. Once a good profile of a stalker’s language use has been learned, an additional layer of security will be employed to analyze publications automatically and flag for inspection any article determined to conform to the language use of known stalkers."

I expect that whoever is developing this software possesses this technology? (fyi: Popular Science might be interested.) Why don't you talk a little more ambiguously there DeVoy. Your vague language of "neural networks" isn't encouraging me enough.

I found that article here: http://www.whiterosejournal.info/id7.html as well. It seems to have been copied and pasted, word for word without any modifications. If DeVoy didnt post it, then who did? It doesnt matter. I would rather he build his own sandbox and keep his ramblings to himself, much like his alter ego KOBE does. They have their own news, forums, and site. Both of you should get married.

I saved the page when I made my post, and there was no copyright notice posted there. Somebody just threw it up there after this article appeared here. Besides, I just found another copy of it at KOBE, sans the copyright notice.